Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
9dfe5312a94b4669df4c03c9b9e99970N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9dfe5312a94b4669df4c03c9b9e99970N.exe
Resource
win10v2004-20240802-en
General
-
Target
9dfe5312a94b4669df4c03c9b9e99970N.exe
-
Size
2.7MB
-
MD5
9dfe5312a94b4669df4c03c9b9e99970
-
SHA1
f28465e56a254e9e85978b473b920d7e89c658ab
-
SHA256
fa657b0e187b1c82570b67b38569e4fca8981f72b8e7a6073b4c70524bdfda9d
-
SHA512
c28f218a92bae68a44a88a65bcc0e6a7c50f0d1982b25cc2eecddb555cee85a614c303458eea8652c49dad07fce032ac0bce27eff69c116839e1f79307cddd62
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBi9w4Sx:+R0pI/IQlUoMPdmpSps4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3268 adobloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocMZ\\adobloc.exe" 9dfe5312a94b4669df4c03c9b9e99970N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBU6\\dobxsys.exe" 9dfe5312a94b4669df4c03c9b9e99970N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dfe5312a94b4669df4c03c9b9e99970N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adobloc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 3268 adobloc.exe 3268 adobloc.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3268 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 86 PID 4384 wrote to memory of 3268 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 86 PID 4384 wrote to memory of 3268 4384 9dfe5312a94b4669df4c03c9b9e99970N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dfe5312a94b4669df4c03c9b9e99970N.exe"C:\Users\Admin\AppData\Local\Temp\9dfe5312a94b4669df4c03c9b9e99970N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\IntelprocMZ\adobloc.exeC:\IntelprocMZ\adobloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f14b3d6adad62d1bec3ae2856e5668ec
SHA121b9e5e26f337af511ae0e07cf3fca4bba07b9ec
SHA2561e6a12ec50d19d5f81d63de16a0a8658e77f4c9b57f06935f203aaa2aec9e096
SHA5121f4edd656a2e87ab6e790007168d94d2d727c311fe9629c0dfbdecb23d612ab2a07df4d6c78ac74c223e6af8e752b414d621f4d61aa8fe59d771b2c5b5609d59
-
Filesize
2.7MB
MD52a859d7da6da8ca2583b07d75eab9ed8
SHA10d960baaef0c818b9b1abfb6fbe5786b9022d7e8
SHA2569ee20d2f844c3c95d3b26e62b560667c66f77cb061ed36ecfa231cfa942bebce
SHA5128157a039765f65fbe09aae17c1c4f149cbc2576860a58ef263789474d185868b90458bd531e9256472d013926141ebb9dde75385bbf5339dea8bffd46663af94
-
Filesize
198B
MD5372566968abc1d20875a947e01233277
SHA139ea4e6b973d9d0279010afe2914dec64c3772cf
SHA2562e803281e05748b49fa02122c4657faa479847d0176c330cd5dff89ffdef5cc0
SHA512853608a1ffc4daa8f4b2b89f8f6137d018384b6c9b7137f6f8869ad8381e9df6263cfcda81dcd1bfb265360a32e3ac3ef05accfd7a68ad5b4aef271a16da681d